Video Transcription

This is macho one the introduction and it'll be taught by myself. Troy Lemaire

00:12

So what is this course about this training from Sai Bury? It will cope you with knowledge and expertise so that you can create an implement i t security policies in your organization.

00:22

I've gone ahead and broken this up into four sections and each section is gonna have episodes that are gonna cover a specific topic.

00:30

Each of the episodes air under 10 minutes, so they're very short in nature, and the topics will cover our general policy network policy, server security and application security.

00:41

A good example of why you need policies in an organization. Remote access is something that is usually granted to vendors and third parties that need to connect in and provide support to you by remotely accessing the terminals inside of your network.

00:56

Well, if one of those tools that they use it has a vulnerability attached to it than that, vulnerability is automatically attached to your network in your organization. So

01:06

if you want to be able to provide a policy to the different departments and staff that says, these are the types of remote access is that we allow. And these are the types of remote access tools that we allow that could be put into a policy that is spread out all the

01:21

departments and the employees. And then at that point, if they don't involve I t department win providing remote access, at least they have some guidance and a policy that they can look at to discuss with their vendor or their third party.

01:34

But the target audience for this course, if you are a computer science, are a cybersecurity student. You're looking to learn more about I t. Security policies.

01:42

If you're a career professional that's looking to make the jump into the I T. Security work,

01:48

if you're an engineer and you're looking to improve your understanding of I T. Security,

01:53

and if you're a leader who's looking to implement I T. Security policies in your organization, this is a great course for you to be able to take

02:00

pre requisites. So if you have a good knowledge of the basic

02:06

I T. Terminology,

02:07

understanding of network concepts and understanding of server concepts and an understanding of application concepts, then you will understand the material that's inside of this course. If you don't know any of these things are not as knowledge was. You want to be in any of these topics. Cyberia has some great

02:24

courses that will help you to be able to have a better understanding of the concepts that are listed on the screen

02:31

a little bit about myself. Begin. My name is Troy Lemaire. I'm an I T security officer and also a teacher here on Cyber Eri.

02:39

I have about 16 years working with I t Security.

02:44

In the last 10 years, I've been working in I t security in the health care and the banking industry.

02:51

But the learning objectives of this course

02:53

what you will be able to walk away with a good understanding of i t security policies that need to be implemented in an organization. The difference between the different types of i t security policies

03:04

Definitely trying to make you understand the basic format of I t security policies and what they're supposed to look like and then laying the groundwork for any future classes that you want to take in regards to I t security.

03:17

So we have a pre assessment.

03:20

What type of policies do you want to learn more about?

03:23

If you want to learn about general policies, which arm or about the user's than the systems?

03:28

Or do you want to learn more about network policies? Which is more by the end points?

03:31

Do you want to learn more about server policies, which is about the server systems? Or do you want to learn more about the application policies, which is about the applications that are used within an organization?

03:46

If you wanna learn about general policies, you gonna want to go to Module two

03:50

Some of the policies that are listed in there or acceptable use data Bake up

03:54

data backup and evil policies.

03:59

If you wanna learn about network policies, you would look at Module three and they have such policies. Is B Y O D. Which is bring your own device. Remote access, which we talked about previously. And then wireless security policy.